0% found this document useful (0 votes)
33 views

BLABLE

This chapter describes the methodology used in the study. A quantitative research approach using a descriptive survey was used to assess the effectiveness of an interactive cybersecurity education program. The population was 80 ICT students across grades 11 and 12 at ACLC College. Using Slovin's formula, a random sample of 74 students was selected. A customized survey questionnaire with closed-ended questions in checklist and Likert scale formats was used to collect data on students' cybersecurity knowledge and engagement. Descriptive statistics like mean and percentage frequency distribution would be used to analyze the data. Ethical practices like informed consent and confidentiality were followed.

Uploaded by

fredmarkivand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

BLABLE

This chapter describes the methodology used in the study. A quantitative research approach using a descriptive survey was used to assess the effectiveness of an interactive cybersecurity education program. The population was 80 ICT students across grades 11 and 12 at ACLC College. Using Slovin's formula, a random sample of 74 students was selected. A customized survey questionnaire with closed-ended questions in checklist and Likert scale formats was used to collect data on students' cybersecurity knowledge and engagement. Descriptive statistics like mean and percentage frequency distribution would be used to analyze the data. Ethical practices like informed consent and confidentiality were followed.

Uploaded by

fredmarkivand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CHAPTER III

Within this chapter, the investigators furnish an intricate account of the approaches and
methodologies employed, the demographic representation and selection, the research tools, the
methodologies of data collection, as well as the procedures for data manipulation and statistical
analysis. These aforementioned components offer comprehensive insights into the operational aspects
of this research endeavor.

Methods and Techniques

The research strategy adopted for our study titled "Enhancing Cybersecurity Resilience: An
Investigation into the Effectiveness of an Interactive and Gamified Cybersecurity Education Program for
Students Enrolled in Information and Communication Technology (ICT)" is being conducted at ACLC
College of Malolos. The researchers will employ a quantitative research approach to quantitatively
assess the effectiveness of Interactive and Gamified Cybersecurity Education Program for ICT students.
Quantitative research, as elucidated by (Robinson, 2021), centers on the collection and analysis of
numerical data. In the context of our research, it aligns with descriptive research since its objective is to
accumulate measurable data for the statistical scrutiny of a particular phenomenon – the impact of
multimedia on enhancing vocabulary retention. This approach allows for a comprehensive
comprehension and portrayal of this phenomenon. Descriptive Survey Research, a subset of descriptive
research, blends both quantitative and qualitative data to provide dependable and pertinent insights.
This research strategy, as demonstrated by Harris and (Turner, 2019), offers an efficient approach that
engages individuals central to the research aim. Within this design, multiple variables are explored, and
data is gathered through surveys, observations, and case studies, facilitating the observation, collection,
and analysis of trustworthy and valid responses. This approach focuses on the systematic and precise
characterization of a population, circumstance, or phenomenon. It can address questions pertaining to
what, where, when, and how, although it does not delve into the "why" aspect (Miller, 2018). The
research queries will be thoughtfully devised to align with the research's intended objectives and
purpose at ACLC College of Malolos (Parker, 2020). We will utilize a researcher-created survey
questionnaire in a closed-ended question format, wherein respondents select a single response
alternative, adhering to the guidance of (Chan, 2017).

Population and Sample of the Study

Random sampling is a method of selecting a subset of individuals from a larger population in a


way that each member of the population has an equal chance of being chosen. In the context of this
research, a straightforward random sampling approach is employed. This means that every student
majoring in Information and Communication Technology (ICT) and Computer Science at ACLC College of
Malolos, across all academic levels from grade 11 to grade 12, has an equal opportunity to be included
in the study.Specifically, this involves designating one class for each grade level in grade 11 and 12. To
determine the sample size, the researchers use Slovin's formula: (n = \frac{N}{1 + Ne^2}), where (N) is
the total population size, in this case, 80 students. This formula takes into account a 3% margin of error
and a 90% confidence level. The resulting computed sample size is (n = 74).
n = 80/1+80x0.03^2

n = 80/1+80x0.0009

n = 80/1+0.072

n = 80/1.072

n = 74.63 or 74

It's essential to note that the random selection of these 74 students will be conducted across all sections
to uphold fairness in participation opportunities. This approach also considers the possibility of having
varying numbers of students in different sections. Both Information and Communication Technology
(ICT) and Computer Science students will be part of the randomly selected survey participants.

Research Instruments

In this study on Enhancing Cybersecurity Resilience and Education for ICT Students, the
researchers have employed a customized survey questionnaire. It consists of closed-ended questions
structured into four distinct sections, each addressing various aspects of the research problem (Russel
and Hamsfort, 2014). The initial segment includes a Checklist, providing respondents with the option to
select one or multiple responses. This approach facilitates a thorough evaluation of the students' level of
acquaintance with diverse cybersecurity ideas relevant to the study. In the second section, the
researchers have utilized a Likert Scale, a five-point rating system that enables respondents to express
their level of agreement or disagreement with specific statements (Mcmahon, 2021). In the third and
final section, the Likert Scale format is also utilized. The aim here is to evaluate how students interact
with cybersecurity content. Respondents are required to indicate their level of engagement in these
activities using the following scale: 5 = Strongly Agree, 4 = Agree, 3 = Neutral, 2 = Disagree, and 1 =
Strongly Disagree.

Data Collection Procedures

The research is conducted at ACLC College of Malolos, specifically focusing on students within the
ICT program. To commence the data collection process, a formal request letter will be submitted to the
college administration, seeking permission to distribute the survey form to the students. Research
operations proceed without any external limitations. The survey form will be electronically created using
Google Forms and distributed after obtaining approval from the Academic Head. Prior to administering
the survey forms, informed consent will be obtained from all participants, including teachers, and the
collected data will be treated with the utmost confidentiality. To gather responses, the researchers will
contact class representatives through private messages to request permission for distributing survey
questionnaires. The responses will be collected from randomly selected students enrolled in the ICT
program across all academic levels. The survey instructions will be made clear and self-explanatory to
avoid any confusion, and respondents can expect the survey to take approximately thirty (20) minutes
to complete, allowing them to allocate the remaining time to other activities.

Data Processing and Statistical Treatment

Within the realm of descriptive statistics, the research will employ the following statistical tools.
Mean, defined by (Weiwen, 2021) as the most commonly utilized measure of central tendency, will be
calculated as the total sum of the dataset divided by the total number of entries. Additionally,
percentage frequency distribution will be employed to systematically represent the data, enabling a
clear depiction of information from data points, typically organized into tables (Smith, 2013). Percentage
frequency distribution will be used to analyze the initial part of the survey questionnaire, aimed at
identifying the cybersecurity concepts with which students in the ICT program are most familiar.
Familiarity will be expressed as a percentage relative to the total responses within each concept. In the
second section, the Mean will be utilized to understand and evaluate the cybersecurity concepts that
most significantly contribute to knowledge retention, as perceived by the respondents. Similarly, in the
third section, Mean will be employed to identify how students assess their knowledge retention based
on the three learning assumptions relevant to cybersecurity education. All the collected data will be
presented in tables to facilitate a more comprehensive interpretation and systematic presentation,
aligning with the approach advocated by (Perrins, 2011), who emphasized that tables serve as effective
tools for visualizing data in the context of descriptive statistics.

Ethical Concerns

During the data collection process, the researchers prioritize the well-being and ethical treatment
of participants. To achieve this, participants are fully informed about the research's purpose and
potential impact, and data collection is strictly voluntary, devoid of stress or harm. Personal information
is held confidential, accessible only to authorized personnel to preserve privacy, and the assessment
solely utilizes relevant information. These safeguards ensure ethical research practices and protect
participants' rights and welfare.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy